US20140365784A1 - Setting-data encrypting apparatus, information processing apparatus, and setting changing method - Google Patents
Setting-data encrypting apparatus, information processing apparatus, and setting changing method Download PDFInfo
- Publication number
- US20140365784A1 US20140365784A1 US14/292,959 US201414292959A US2014365784A1 US 20140365784 A1 US20140365784 A1 US 20140365784A1 US 201414292959 A US201414292959 A US 201414292959A US 2014365784 A1 US2014365784 A1 US 2014365784A1
- Authority
- US
- United States
- Prior art keywords
- setting
- data
- input
- information processing
- processing apparatus
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Abandoned
Links
- 230000010365 information processing Effects 0.000 title claims abstract description 43
- 238000000034 method Methods 0.000 title claims description 34
- 230000008859 change Effects 0.000 claims description 34
- 230000008569 process Effects 0.000 claims description 20
- 230000006870 function Effects 0.000 description 10
- 238000004891 communication Methods 0.000 description 9
- 230000004044 response Effects 0.000 description 9
- 230000008901 benefit Effects 0.000 description 5
- 101100421709 Schistosoma mansoni SM21.7 gene Proteins 0.000 description 4
- 230000004913 activation Effects 0.000 description 4
- 230000005540 biological transmission Effects 0.000 description 4
- 239000000284 extract Substances 0.000 description 4
- 238000004519 manufacturing process Methods 0.000 description 4
- 238000012545 processing Methods 0.000 description 4
- 230000014509 gene expression Effects 0.000 description 3
- 238000012544 monitoring process Methods 0.000 description 3
- 101100421708 Schistosoma mansoni SM20 gene Proteins 0.000 description 2
- 230000003247 decreasing effect Effects 0.000 description 2
- 101000999373 Homo sapiens Interferon-related developmental regulator 2 Proteins 0.000 description 1
- 102100036480 Interferon-related developmental regulator 2 Human genes 0.000 description 1
- 101000639461 Rattus norvegicus Small nuclear ribonucleoprotein-associated protein B Proteins 0.000 description 1
- 101100202463 Schizophyllum commune SC14 gene Proteins 0.000 description 1
- 230000004075 alteration Effects 0.000 description 1
- 230000009977 dual effect Effects 0.000 description 1
- 238000005516 engineering process Methods 0.000 description 1
- 230000006872 improvement Effects 0.000 description 1
- 238000012905 input function Methods 0.000 description 1
- 230000008520 organization Effects 0.000 description 1
- 238000006467 substitution reaction Methods 0.000 description 1
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/71—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information
- G06F21/73—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information by creating or determining hardware identification, e.g. serial numbers
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/602—Providing cryptographic facilities or services
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/10—Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
- G06F21/12—Protecting executable software
- G06F21/121—Restricting unauthorised execution of programs
- G06F21/125—Restricting unauthorised execution of programs by manipulating the program code, e.g. source code, compiled code, interpreted code, machine code
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L41/00—Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
- H04L41/08—Configuration management of networks or network elements
- H04L41/0803—Configuration setting
- H04L41/0813—Configuration setting characterised by the conditions triggering a change of settings
- H04L41/082—Configuration setting characterised by the conditions triggering a change of settings the condition being updates or upgrades of network functionality
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L41/00—Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
- H04L41/08—Configuration management of networks or network elements
- H04L41/0803—Configuration setting
- H04L41/0823—Configuration setting characterised by the purposes of a change of settings, e.g. optimising configuration for enhancing reliability
- H04L41/083—Configuration setting characterised by the purposes of a change of settings, e.g. optimising configuration for enhancing reliability for increasing network speed
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/06—Network architectures or network communication protocols for network security for supporting key management in a packet data network
- H04L63/062—Network architectures or network communication protocols for network security for supporting key management in a packet data network for key distribution, e.g. centrally by trusted party
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/34—Network arrangements or protocols for supporting network services or applications involving the movement of software or configuration parameters
Definitions
- the embodiments discussed herein are related to a technology for changing a setting related to a performance of an information processing apparatus such as a server.
- servers provide servers whose settings related to performance are changeable.
- the settings related to performance include the number of CPUs (Central Processing Units) actually operated on a server, the amount of available memory, the enabling or disabling of an option function, and so on.
- CPUs Central Processing Units
- Makers that provide such a server whose settings are changeable ordinarily charge fees in accordance with the settings are changeable ordinarily charge fees in accordance with the settings.
- a “setting” hereinafter refers to a factor related to performance that changes a price (selling price or rental fee (fee for use)), unless otherwise noted.
- Setting data will hereinafter be referred to as “model lock data”.
- a customer who uses a server whose settings are changeable may change a setting in accordance with a performance that the server to have.
- the customer may suppress the amount of payment by selecting a low-performance setting when a relatively small amount of data is predicted to be processed, and may select a higher-performance setting when the amount of data to be processed increases.
- the customer may take the opposite measure.
- a performance may be changed by changing a setting, and hence the server itself would not be changed.
- a server whose settings are changeable allows a customer to suppress the amount of payment and is capable of performing desired data processing, thereby offering high convenience.
- An amount paid by a customer will hereinafter be referred to as a “fee for use” for convenience.
- FIG. 1 illustrates examples of model lock data.
- Model lock data 1 ( 1 - 1 to 1 - 8 ) in FIG. 1 is intended to change a plurality of setting items.
- FIG. 1 indicates only “model ID”, “number of CPUs”, and “clock” as setting items.
- the setting items are indicated as “model lock words”.
- the “model ID” is a model lock word (setting item) for roughly grading a performance. In FIG. 1 , a model ID of a higher value leads to a higher performance.
- the “number of CPUs” is a model lock word that designates the number of CPUs actually operated, and the “clock” is a model lock word that designates a clock frequency at which a CPU is operated.
- the model lock data 1 depicted in FIG. 1 not only relates to a fee for use collected from a customer but also directly affects a performance of a server used by the customer.
- the model lock data 1 is confidential. Accordingly, the model lock data 1 is encrypted before being input to a server.
- a common key cryptography is typically used wherein the same key is also used for decoding.
- Unique information that is different for each server is usually used as a key. Hence, only an objective server can change a setting indicated by encrypted model lock data 1 without a key being input.
- a server used by a customer is not necessarily located within a facility managed by the maker (e.g., data center).
- the server is not necessarily connected to a maker-side terminal apparatus via a network.
- Maker-side terminal apparatuses are not used for management of the server or the like, and hence there is very little need to connect such terminal apparatuses to the server.
- the server is not connected to any external element. Accordingly, the actual situation is that a network environment is expectable wherein a maker-side terminal apparatus is connectable to the server.
- a customer engineer inputs model lock data to the server partly because such a network environment is unexpectable.
- Encrypted model lock data 1 is expressed using binary numbers and has a large bit count.
- a typical way to input encrypted model lock data 1 is to record the encrypted model lock data 1 in a portable recording medium and cause the server to read the recording medium.
- the maker To cause the server to read the recording medium in which the encrypted model lock data 1 is recorded, the maker prepares and delivers the recording medium. Alternatively, the maker transmits encrypted model lock data 1 via a network to a terminal apparatus operated by the CE, and the received model lock data 1 is written to a recording medium accessible from the terminal apparatus.
- the maker transmits encrypted model lock data 1 via a network to a terminal apparatus operated by the CE, and the received model lock data 1 is written to a recording medium accessible from the terminal apparatus.
- the maker prepares a recording medium, it takes time to deliver the recording medium, thereby making it difficult to quickly change a setting of the server.
- the model lock data 1 may be incapable of being transmitted via the network. It is also possible that the CE does not have a terminal apparatus capable of accessing a recording medium that the server can read, or that an available recording medium is not present. Both of these possibilities hinder the quick changing of a setting of the server.
- a customer may possibly request that a setting of a server be urgently changed. In consideration of the possibility, it is important to ensure that the settings of a server can be changed quickly.
- Patent document 1 Japanese Laid-open Patent Publication No. 2003-303028
- Patent document 2 Japanese Laid-open Patent Publication No. 2007-11944
- one system to which the invention has been applied includes an input device, a processor, and an output device.
- Setting data is input from the input device.
- the setting data indicates a detail to be newly set to an information processing apparatus whose performance-related setting is to be changed.
- the processor encrypts the setting data input via the input device.
- the output device outputs encrypted data in a character string format.
- FIG. 1 illustrates examples of model lock data
- FIG. 2 illustrates a method for changing a setting related to a performance of an information processing apparatus, the method being achieved in accordance with the embodiment
- FIG. 3 is a flowchart illustrating an exemplary sequence of an operation of changing a setting related to a performance of an information processing apparatus in accordance with the embodiment
- FIG. 4 illustrates an exemplary functional configuration of a setting-data encrypting apparatus in accordance with the embodiment
- FIG. 5 illustrates an exemplary functional configuration of a CL apparatus that is an information processing apparatus in accordance with the embodiment
- FIG. 6 illustrates examples of a selection screen and a PMLKD entry screen, both displayed by a CL apparatus
- FIG. 7 illustrates an exemplary change-history screen
- FIG. 8 is a flowchart of a data creating process
- FIG. 9 is a flowchart of an updating process
- FIG. 10 illustrates an exemplary configuration of an information processing apparatus usable as a setting-data encrypting apparatus in accordance with the embodiment.
- FIG. 11 illustrates an exemplary configuration of a CL apparatus that is an information processing apparatus in accordance with the embodiment.
- FIG. 2 illustrates a method for changing a setting related to a performance of an information processing apparatus, the method being achieved in accordance with the embodiment.
- FIG. 3 is a flowchart illustrating an exemplary sequence of an operation of changing a setting related to a performance of an information processing apparatus in accordance with the embodiment.
- numeral 20 indicates a terminal apparatus (e.g., PC (Personal Computer)) installed in amass-production factory where a maker manufactures information processing apparatuses
- numeral 30 indicates an information processing apparatus delivered to a customer.
- the terminal apparatus 20 is an information processing apparatus mounted with a setting-data encrypting apparatus in accordance with the embodiment
- the information processing apparatus 30 is an information processing apparatus in accordance with the embodiment.
- the information processing apparatus 30 fabricated by the maker will hereinafter be referred to as a “CL apparatus”. Note that “CL” means “Client”.
- model lock data At a request from the customer, an operator who operates the terminal apparatus 20 in the mass-production factory creates model lock data.
- the embodiment is based on the premise that, as depicted in FIG. 1 , a plurality of model lock words (items) are present as model lock data.
- an operator can manually change a setting of the CL apparatus 30 .
- a setting can be changed for each model lock word so that the amount of data manually input by the operator can be minimized.
- PMLKD Partial Model Lock DATA, is data for changing the setting of one model lock word.
- a PMLKD specify a corresponding model lock word.
- model-lock-word class data data indicating a model lock word
- setting value data indicating the setting of the model lock word
- Numeral 2 in FIG. 2 indicates an encrypted PMLKD or, more precisely, a PMLKD output from the terminal apparatus 20 .
- “A2EG78-IS2261” indicates as examples the details of a PMLKD 2 that has been output. Note that numeral 2 is assigned only to a PMLKD in a character string format.
- a PMLKD 2 is output in a character string format (in this example, alphanumeric character string format).
- a character string format in this example, alphanumeric character string format.
- a PMLKD 2 is output using a data representation that can be easily input in a manual manner, thereby decreasing the case to record the PMLKD 2 in a recording medium. This is because information indicating the PMLKD 2 can be transmitted to an operator who is in charge of the changing of a setting of a customer CL apparatus 30 , so that the operator can appropriately change the setting of the CL apparatus 30 .
- the sequence of the operation represented in FIG. 3 enables changing a setting of the CL apparatus 30 through creation of a PMLKD 2 .
- the terminal apparatus 20 stores a program used to create a PMLKD 2 (hereinafter referred to as a “model lock tool”).
- the operator causes the terminal apparatus 20 to execute the model lock tool so as to input data to create a PMLKD 2 (SM 2 ).
- Data to be input (or designated) by the operator at least includes unique information (serial ID) assigned to an objective CL apparatus 30 , the class of an objective model lock word, and a setting value indicating a detail to be newly set by that class of model lock word.
- the terminal apparatus 20 also adds a dummy and check data set by a password of the terminal apparatus 20 .
- a model-lock-word class and a setting value is to be input for each model lock word.
- Check data is used to check whether an error has occurred in a data constellation of a dummy, model-lock-data class data, and setting-value data.
- a dummy which is data used to improve confidentiality, makes it more difficult to guess a model lock word and a setting value thereof.
- the operator instructs the model lock tool to create a PMLKD 2 .
- the terminal apparatus 20 that executes the model lock tool gathers and encrypts, for each model lock word, model-lock-word class data and setting-value data of the model lock word by using input unique information, and outputs the resultant data in a character string format (SM 2 ).
- SM 2 character string format
- the PMLKD 2 output in a character string format is reported by a mass-production factory operator (e.g., an operator who operates the terminal apparatus 20 ) to an operator at a customer's site using e-mail, telephone, facsimile, or the like.
- a mass-production factory operator e.g., an operator who operates the terminal apparatus 20
- the operator at a customer's site manually inputs the reported PMLKD 2 to the CL apparatus 30 and orders application of the PMLKD 2 (SC 1 ).
- the CL apparatus 30 decodes the input PMLKD 2 using the serial ID of itself (SC 2 ).
- the CL apparatus 30 determines whether the decoded check data is identical with the check data obtained from the decoded dummy, the decoded model-lock-data class data, and the decoded setting-value data (SC 3 ).
- SC 4 the decoded setting-value data
- the CL apparatus 30 changes a setting in accordance with the input PMLKD 2 (SC 4 ).
- the CL apparatus 30 reports to the operator that an error has occurred, without changing a setting in accordance with the input PMLKD 2 (SC 5 ).
- FIG. 4 illustrates an exemplary functional configuration of a setting-data encrypting apparatus in accordance with the embodiment.
- the setting-data encrypting apparatus in accordance with the embodiment includes a UI (User Interface) unit 201 , a data creating unit 202 , an encrypting unit 203 , a medium creating unit 204 , a PMLKD-data creating unit 205 , and a PMLKD encrypting unit 206 .
- the data creating unit 202 , the encrypting unit 203 , and the medium creating unit 204 are functions to record encrypted model lock data in a portable recording medium 220 (indicated as a “portable medium” in FIG. 4 , and such an expression will be used hereinafter).
- the PMLKD-data creating unit 205 and the PMLKD encrypting unit 206 are functions for creating and outputting a PMLKD 2 .
- the UI unit 201 is a function to create a screen presented to an operator who operates the terminal apparatus 20 and to allow the operator to input data (including, in this example, various instructions and so on). And the UI unit 201 obtains the input data.
- the UI unit 201 first displays a selection screen to allow the operator to select an object to be created. As a result of the selection, one of the portable medium 220 or the PMLKD 2 is specified as an object to be created. Then, the UI unit 201 causes the operator to input data that depends on the result of the selection.
- Data is input in the order of, for example, the inputting of the serial ID of a CL apparatus 30 for which a setting is to be changed ⁇ the inputting of setting-value data.
- a creation history database (DB) 211 stores, for each CL apparatus 30 , setting-value data input in the past.
- a serial ID is data for unique identification of a CL apparatus 30 . In the embodiment, a serial ID is initially input so that the operator can check setting-value data input in the past.
- the UI unit 201 displays an entry screen to allow the operator to input a serial ID.
- the serial ID input by the operator using the entry screen is reported from the UI unit 201 to the PMLKD-data creating unit 205 .
- the serial ID is saved as an encryption key 213 .
- the PMLKD-data creating unit 205 searches the creation history DB 211 using the reported serial ID as a key and, for each model lock word, extracts the most recently designated setting value and a creation date.
- the model lock words include those that have been changed due to a creation of a portable medium 220 , so that the operator can check the current setting value of each model lock word.
- the pieces of extracted data are reported from the PMLKD-data creating unit 205 to the UI unit 201 , which displays a setting-value entry screen in which the pieces of reported data are arranged in a time sequence.
- the history displayed on the screen is the one depicted in FIG. 7 .
- FIG. 7 illustrates a change-history screen 701 indicating the history of a setting change made in the past by the CL apparatus 30 .
- the change-history screen 701 For each model lock word for which a setting value has been changed, the change-history screen 701 includes a character string indicating the class of the model lock word, setting-value data, and a date on which a setting was changed (including time, in this example).
- the character-string expressions “CPU NUMBER”, “MSU SIZE”, and “ESA MODE” respectively indicate the number of CPUS, the capacity of a main storage, and an ESA (Enterprise Service Architecture) mode.
- “4 CPU” means four CPUs
- “512 MB” means that a main storage has a capacity of 512 MB.
- ESA is a specification that supports all principal functions of SOA (Service Oriented Architecture), and “ENABLE”, indicated as a setting value of the ESA mode, means that the ESA mode has been enabled.
- the setting-value entry screen also displays, for each model lock word, a list of a character string indicating a model-lock-word class, a setting value, and a date. Accordingly, while checking current settings, the operator selects a model lock word for which a setting is to be changed, and inputs the setting value. The selected model lock word and the input setting value are reported from the UI unit 201 to the PMLKD-data creating unit 205 when, for example, the operator indicates the end of the inputting.
- Some model lock words have a setting value that is to be determined in accordance with the setting value of another model lock word.
- setting-value information 212 is prepared to determine whether a setting value input by a model lock word of a class selected by the operator is valid.
- the PMLKD-data creating unit 205 refers to setting-value information 212 and determines whether the setting value input by the model lock word is valid. Determining that the setting value is invalid, the PMLKD-data creating unit 205 reports this fact to the UI unit 201 . In response to the report, the UI unit 201 displays a setting entry screen that, for example, includes a message to urge the operator to check the input information. This at least disables the inputting of a setting value judged to be invalid.
- the PMLKD-data creating unit 205 reports, for each model lock word, a class and a setting value thereof to the PMLKD encrypting unit 206 .
- the PMLKD encrypting unit 206 gathers and encrypts, for each model lock word, a setting value and class data indicating the class of the model lock word.
- a PMLKD i.e., encrypted data obtained via the encrypting, is reported to the UI unit 201 via the PMLKD-data creating unit 205 .
- the UI unit 201 displays a reported PMLKD in a character string format. This allows the operator to convey the displayed PMLKD 2 to another operator at the customer's site using various electronic transmission techniques such as e-mail, telephone, and facsimile.
- the UI unit 201 displays an entry screen to allow the operator to input the serial number of a CL apparatus 30 for which a setting is to be changed.
- the UI unit 201 reports, to the data creating unit 202 , the serial ID input on the entry screen by the user.
- the serial ID is saved as an encryption key 213 .
- the data creating unit 202 searches the creation history DB 211 and extracts, for each model lock word for which a PMLKD 2 was created in the past or for which a setting value was changed in the past, a model-lock-word class data, a setting value, and a creation date. Those pieces of extracted data are reported from the data creating unit 202 to the UI unit 201 , which displays a setting-value entry screen in which the pieces of reported data are arranged.
- the operator While checking current settings, the operator selects a model lock word for which a setting is to be changed, and inputs the setting value.
- the selected model lock word and the input setting value are reported from the UI unit 201 to the data creating unit 202 when, for example, the operator indicates the end of the inputting.
- the data creating unit 202 refers to setting-value information 212 to determine, for each selected model lock word, whether an input setting value is valid. When a model lock word is judged to be invalid, the data creating unit 202 reports this fact to the UI unit 201 . In response to the report, the UI unit 201 displays a setting entry screen that, for example, includes a message to urge the operator to check input information. This at least invalidates the inputting of a setting value judged to be invalid.
- the data creating unit 202 reports, for each model lock word, a class and a setting value thereof to the encrypting unit 203 .
- a latest setting value stored in the creation history DB 211 is reported to the encrypting unit 206 .
- the encrypting unit 203 gathers and encrypts the setting values of all of the model lock words, i.e., pieces of model lock data.
- the encrypted data (model lock data) obtained via the encrypting is reported to the medium creating unit 204 .
- the medium creating unit 204 writes, to a portable medium 220 set up by the operator, the encrypted data reported from the encrypting unit 203 . After writing the encrypted data, the medium creating unit 204 reports this fact to the encrypting unit 203 .
- the encrypting unit 203 reports to the data creating unit 202 data indicating the completion of the encrypting.
- the data creating unit 202 reports to the UI unit 201 the completion of the creating of the portable medium 220 .
- the UI unit 201 displays a screen for reporting the completion of the creating of the portable medium 220 to the operator.
- FIG. 10 illustrates an exemplary configuration of an information processing apparatus usable as a setting-data encrypting apparatus in accordance with the embodiment.
- the following will specifically describe an exemplary configuration of the setting-data encrypting apparatus in accordance with the embodiment, i.e., an information processing apparatus usable as the terminal apparatus 20 used at a mass-production factory.
- the information processing apparatus includes a CPU 101 , a ROM 102 , a memory (memory module) 103 , an NIC (Network Interface Card) 104 , a hard disk apparatus (HD) 105 , a medium driving apparatus 106 , a display apparatus 107 , an input device 108 , and a controller 109 .
- This configuration is an exemplary information processing apparatus usable as the terminal apparatus 20 , and the configuration of the information processing apparatus that achieves the setting-data encrypting apparatus in accordance with the embodiment is not limited to the one depicted in FIG. 10 .
- the ROM 102 is a memory that stores a BIOS (Basic Input/Output System).
- the CPU 101 loads the BIOS into the memory 103 to execute this system.
- the hard disk apparatus 105 stores an OS (Operating System) and various programs that include a model lock tool operated on the OS (e.g., an application program, which will hereinafter be referred to as an “application”).
- OS Operating System
- various programs that include a model lock tool operated on the OS e.g., an application program, which will hereinafter be referred to as an “application”.
- the CPU 101 may read from the hard disk apparatus 105 the OS and various programs to be executed, and may load the OS and the various programs into the memory 103 to execute them.
- Activation of the BIOS or the OS enables a communication to be performed via the NIC 104 .
- the NIC 104 enables a communication to be performed via a network such as a LAN (Local Area Network).
- a network such as a LAN (Local Area Network).
- An electronic transmission of information on a PMLKD 2 relayed via e-mail, telephone, facsimile, or the like can be performed using the NIC 104 .
- the medium driving apparatus 106 , the display apparatus 107 , and the input device 108 are connected to the controller 109 together with the hard disk apparatus 105 . Via the controller 109 , the CPU 101 controls the medium driving apparatus 106 , displays information on the display apparatus 107 , and recognizes an operation performed using the input device 108 . All of the medium driving apparatus 106 , the display apparatus 107 , and the input device 108 may be detachable elements.
- the medium driving apparatus 106 is accessible to the portable medium 220 .
- the display apparatus 107 is used to display various screens.
- the input device 108 which includes, for example, a keyboard and a pointing device, enables the inputting of various pieces of data and allows various instructions to be given.
- a model lock tool is an application operated on, for example, an OS.
- the model lock tool is stored in the hard disk apparatus 105 .
- the creation history DB 211 and setting-value information 212 are also saved in, for example, the hard disk apparatus 105 .
- the encryption key 213 is saved in the memory 103 .
- the UI unit 201 is achieved by the CPU 101 , the ROM 102 , the memory 103 , the hard disk apparatus 105 , the display apparatus 107 , the input device 108 , and the controller 109 .
- the data creating unit 202 , the encrypting unit 203 , the PMLKD-data creating unit 205 , and the PMLKD encrypting unit 206 are achieved by the CPU 101 , the ROM 102 , the memory 103 , the hard disk apparatus 105 , and the controller 109 .
- the medium creating unit 204 is achieved by the CPU 101 , the ROM 102 , the memory 103 , the hard disk apparatus 105 , the medium driving apparatus 106 , and the controller 109 .
- FIG. 8 is a flowchart of a data creating process.
- the data creating process is achieved by executing the aforementioned model lock tool, and the portable medium 220 and a PMLKD 2 are created by the data creating process.
- FIG. 8 depicts a flow from activation to creation of the portable medium 220 or a PMLKD 2 .
- the configuration of the terminal apparatus 20 that performs the data creating process is the one depicted in FIG. 10 .
- the CPU 101 causes the display apparatus 107 to display a selection screen (SM 11 ). Then, using the controller 109 , the CPU 101 monitors an operation performed on the input device 108 by the operator so as to determine whether a portable medium 220 is selected as an object to be created (SM 12 ). When the operator chooses to create the portable medium 220 , a judgment of YES is indicated in SM 12 , shifting the flow to SM 13 . When the operator chooses to create a PMLKD 2 , a judgment of NO is indicated in SM 12 , shifting the flow to SM 20 .
- the CPU 101 causes the display apparatus 107 to display a screen for allowing the operator to input a serial ID.
- the operator operates the input device 108 to input a serial ID and indicates the completion of the inputting, and, responsively, the CPU 101 searches the creation history DB 211 using the serial ID as a key and extracts a complete set of model lock data after the final data creation (SM 14 ).
- the CPU 101 causes the display apparatus 107 to display a setting-value entry screen indicating the complete set of model lock data that has been extracted (SM 14 ).
- the operator selects a model lock word for which a setting value is to be changed within the displayed model lock data, and inputs a new setting value.
- the CPU 101 monitors the operation performed on the input device 108 by the operator and inputs the setting value (SM 15 ).
- the CPU 101 refers to setting-value information 212 to check the validity of a setting value input for each model lock word by the operator (SM 16 ). After the checking, the flow shifts to SM 17 .
- SM 17 the CPU 101 determines whether the result of the checking is valid. When all of the setting values input by the operator are judged to be valid, a judgment of YES is indicated in SM 17 , shifting the flow to SM 18 . When any of the setting values input by the operator is judged to be invalid, a judgment of NO is indicated in SM 17 , returning the flow to SM 14 . Then, the operator inputs a setting value again. In the displaying of setting values in SM 14 after the returning, setting values input by the operator may be displayed while highlighting a setting value estimated to be inappropriate.
- the CPU 101 gathers and encrypts the setting values on the setting-value entry screen.
- the CPU 101 outputs encrypted model lock data obtained via the encrypting to the medium driving apparatus 106 and stores the encrypted data in the portable medium 220 set up at the medium driving apparatus 106 (SM 19 ).
- the CPU 101 stores, together with the current time and date, the encrypted model lock data in the creation history DB 211 configured on the hard disk apparatus 105 (SM 19 ).
- the CPU 101 causes the display apparatus 107 to display information indicating that the creation of the portable medium 220 has been successfully finished (SM 19 ). After the result is displayed in this manner, the data creating process is finished.
- the CPU 101 causes the display apparatus 107 to display a screen for allowing the operator to input a serial ID.
- the operator operates the input device 108 to input a serial ID and indicates the completion of the inputting, and, responsively, the CPU 101 searches the creation history DB 211 using the serial ID as a key and extracts a complete set of currently enabled model lock data (SM 21 ).
- the CPU 101 causes the display apparatus 107 to display a setting-value entry screen indicating the complete set of model lock data that has been extracted (SM 21 ).
- the operator selects a model lock word for which a setting value is to be input, and inputs the setting value.
- the CPU 101 monitors the operation performed on the input device 108 by the operator and enables the selecting of a model lock word and the inputting of a setting value (SM 22 ).
- the CPU 101 refers to setting-value information 212 to check the validity of a setting value input for each model lock word selected by the operator (SM 23 ). After the checking, the flow shifts to SM 24 .
- SM 24 the CPU 101 determines whether the result of the checking is valid. When all of the setting values input by the operator are judged to be valid, a judgment of YES is indicated in SM 24 , shifting the flow to SM 25 . When any of the setting values input by the operator is judged to be invalid, a judgment of NO is indicated in SM 24 , returning the flow to SM 21 . Then, the operator inputs a setting value again. In the displaying of setting values in SM 21 after the returning, a setting value estimated to be inappropriate maybe deleted, and the inputting of a new setting value may be demanded.
- SM 25 using the input serial ID as the encryption key 213 , the CPU 101 gathers and encrypts model-lock-word class data and a setting value for each model lock word selected on the setting-value entry screen (SM 25 ).
- the CPU 101 uses the controller 109 to display, for example, the PMLKD 2 obtained via the encrypting and a message reporting that the creation of the PMLKD 2 has been successfully finished (SM 25 ).
- the CPU 101 stores, together with the current time and date, model-lock-word class data and a setting value in the creation history DB 211 configured on the hard disk apparatus 108 (SM 25 ). Then, the data creating process is finished.
- a portable medium 220 or a PMLKD 2 is created in accordance with the operator's selection. This aims to allow the operator to choose the better option in accordance with the situation.
- FIG. 5 illustrates an exemplary functional configuration of a CL apparatus that is an information processing apparatus in accordance with the embodiment.
- the CL apparatus 30 includes a UI unit 301 , a medium recognizing unit 302 , a decoding unit 303 , and an applying unit 304 , a PMLKD decoding unit 305 , and a PMLKD applying unit 306 .
- the UI unit 301 is a function to create a screen presented to an operator who operates the CL apparatus 30 and to allow the operator to input data (including various instructions and so on, in this example). And the UI unit 301 obtains the input data.
- the medium recognizing unit 302 , the decoding unit 303 , and the applying unit 304 are functions to enable a setting change that depends on the portable medium 220
- the PMLKD decoding unit 305 and the PMLKD applying unit 306 are functions to enable a setting change that depends on a manually input PMLKD 2 .
- the UI unit 201 first displays a selection screen to allow the operator to select the type of data to be input to the CL apparatus 30 .
- the options are model lock data and a PMLKD 2 , both stored in the portable medium 220 .
- FIG. 6 illustrates examples of a selection screen and a PMLKD entry screen, both displayed by a CL apparatus.
- a selection screen 610 the type of data to be input is selected by inputting value “1” or “2”.
- the character string “1. MODEL LOCK PACKAGE” on the selection screen 610 indicates that “1” is to be input when it is desirable to input data using the portable medium 220 .
- the character string “2. PARTIAL MODEL LOCK DATA” indicates that “2” is to be input when it is desirable to manually input a PMLKD 2 .
- the UI unit 301 displays a PMLKD entry screen 620 as depicted in FIG. 7 .
- the portion that follows the character string “ITEM01 WORD:” on the PMLKD entry screen 620 is an area in which a PMLKD 2 is input, and “123456” and “7890AB” in “123456-7890AB” indicate the actually input PMLKDs 2 .
- the portions that follow the character strings other than the character string “ITEM01 WORD:”, i.e., “ITEM02 WORD:” to “ITEM10 WORD:”, are also areas in which PMLKDs 2 are input.
- the PMLKD decoding unit 305 Upon receipt of the PMLKD 2 , the PMLKD decoding unit 305 decodes the PMLKD 2 using the serial ID of this unit as a decode key 312 . For each decoded PMLKD 2 , the PMLKD decoding unit 305 reports to the UI unit 301 model-lock-word class data and a setting value obtained via the decoding.
- a model lock word has a model ID.
- the setting value of each model lock word is stored in a basic data table 311 .
- the PMLKD decoding unit 305 reports to the UI unit 301 the setting value of each corresponding model lock word in addition to, for example, the setting value of the model ID.
- the UI unit 301 displays a model lock word and a setting value indicated by reported model-lock-word class data, and the operator checks the displayed information. Then, when the operator orders an application execution, the UI unit 301 reports this fact to the PMLKD decoding unit 305 . When the operator orders re-inputting, the UI unit 301 displays the PMLKD entry screen 620 again. When the operator orders cancellation, the UI unit 301 displays, for example, the selection screen 610 again.
- the PMLKD decoding unit 305 reports, to the PMLKD applying unit 306 , model-lock-word class data and a setting value obtained via the decoding, and orders an application execution.
- Model lock data i.e., the setting value of each model lock word
- the PMLKD applying unit 306 converts the setting value of a model lock word for which a setting value has been reported by the PMLKD decoding unit 305 into the reported setting value.
- the PMLKD decoding unit 305 stores, in a history database (DB) 313 , model-lock-word class data and a setting value obtained via the decoding, together with the current time and date.
- the current time and date is stored in the history DB 313 as an application time and date of the setting change at that time.
- the UI unit 301 makes a request for, for example, the decoding unit 303 to read data from the portable medium 220 .
- the decoding unit 303 instructs the medium recognizing unit 302 to read data from the portable medium 220 that has been set.
- the medium recognizing unit 302 is a function to access the portable medium 220 that has been set.
- the medium recognizing unit 302 reads, in accordance with an instruction from the decoding unit 303 , data from the portable medium 220 that has been set, and reports the read data to the decoding unit 303 .
- the data read from the portable medium 220 is encrypted model lock data.
- the UI unit 301 When the portable medium 220 is not set up at the medium recognizing unit 302 , this fact is reported via the decoding unit 303 to the UI unit 301 , which displays a message that urges the portable medium 220 to be set up. After the message is displayed, when the operator orders reading, the UI unit 301 again instructs the decoding unit 303 to read data from the portable medium 220 .
- the decoding unit 303 uses the serial ID of the CL apparatus 30 as the decode key 312 so as to decode the encrypted data reported from the medium recognizing unit 302 .
- the decoding unit 303 reports the model lock data obtained via the decoding to the UI unit 301 .
- the UI unit 301 displays the model lock data reported from the decoding unit 303 , and the operator checks the displayed information.
- the UI unit 301 instructs the decoding unit 303 to apply the model lock data, i.e., to change a setting.
- the decoding unit 303 reports the model lock data to the applying unit 304 and stores the model lock data in the history DB 313 together with the current time and date, i.e., the application time and date.
- the applying unit 304 replaces model lock data of setting data 314 with the model lock data reported from the decoding unit 303 . Then, the applying unit 304 reports to the decoding unit 303 that the applying has been completed.
- the completion of the applying is reported to the UI unit 301 via the decoding unit 303 .
- the UI unit 301 reports this fact to the operator by, for example, displaying such a message.
- the operator may instruct the UI unit 301 to display a change history screen 710 as depicted in FIG. 7 .
- the decoding unit 303 instructs, for example, the PMLKD decoding unit 305 to read data stored in the history DB 313 .
- the displayed change history screen 710 may be used to restore settings.
- the embodiment offers a higher convenience by enabling a change to be made so as to return to a setting without using, for example, the portable medium 220 .
- a change for restoring a setting may be made, for example, by designating a line on the change history screen 710 in which a setting value to be returned to is located and by ordering the setting change. Making such a setting change based on the returning of a setting value also updates setting data 314 and the history DB 313 .
- FIG. 11 illustrates an exemplary configuration of a CL apparatus that is an information processing apparatus in accordance with the embodiment. With reference to FIG. 11 , the following will specifically describe an exemplary configuration of the CL apparatus 30 .
- the CL apparatus 30 includes a plurality of system boards (SBs) 111 , a service processor (SVP) 112 , a disk unit 113 , a communication interface 114 , a bus 115 , an input unit 116 , and a medium driving apparatus 117 .
- the SBs 111 , the SVP 112 , the disk unit 113 , and the communication interface 114 are connected to the bus 115 .
- Each of the SBs 111 is a processing module to allow the CL apparatus 30 to perform data processing and is mounted with a plurality of CPUs 111 a and a plurality of DIMMs (Dual Inline Memory Modules) 111 b.
- Settings of “number of CPUs” and “capacity of main storage apparatus”, i.e., model lock words, designate, for example, the number of SBs 111 actually operated from among all of the SBs 111 .
- the settings designate the number of CPUs 111 a actually operated and the number of DIMMs 111 b used within each SB 111 or designate the capacity of the DIMMs.
- the disk unit 113 is a module used to store various programs executed by each SB 111 and data used by each SB 111 .
- the disk unit 113 is mounted with a plurality of hard disk apparatuses 113 a as storage apparatuses.
- the communication interface 114 includes a plurality of communication ports to establish a connection to, for example, a network, and enables a communication with the network via each communication port.
- Each SB 111 may communicate with the network via the communication interface 114 .
- the SVP 112 which is a module to manage the entirety of the CL apparatus 30 , functions as one information processing apparatus.
- the SVP 112 includes a CPU 112 a, a flash memory 112 b, a RAM (Read Only Memory) 112 c, and an interface (I/F) 112 d.
- the input unit 116 and the medium driving apparatus 117 are connected to the interface 112 d. This allows the CPU 112 a to control the input unit 116 and the medium driving apparatus 117 via the interface 112 d.
- the medium driving apparatus 117 is accessible to the portable medium 220 .
- the input unit 116 which is used by the operator to input data and give various instructions, includes a display unit 116 a and an operation unit 116 b.
- the display unit 116 a displays various screens such as the selection screen 610 and the PMLKD entry screen 620 depicted in FIG. 6 and the change history screen 710 depicted in FIG. 7 .
- the operation unit 116 b includes various keys and so on, and a PMLKD 2 is input by operating the operation unit 116 .
- the UI unit 301 , the medium recognizing unit 302 , the decoding unit 303 , the applying unit 304 , the PMLKD decoding unit 305 , and the PMLKD applying unit 306 depicted in FIG. 5 are achieved by the SVP 112 , the input unit 116 , and the medium driving apparatus 117 .
- the creation history DB 211 is provided.
- the history DB 313 is configured in, for example, the flash memory 112 b.
- the flash memory 112 b also stores the basic data table 311 , the decode key (serial ID) 312 , and setting data 314 .
- the CPU 112 a of the SVP 112 controls the activation of the SB 111 in accordance with setting data 314 and gives instructions on various settings. This reflects the settings based on setting data 314 in the CL apparatus 30 .
- the flash memory 112 b stores a PMLKD 2 or a program for a setting change to be made by the portable medium 220 (hereinafter referred to as “applying program”).
- the elements 301 - 306 depicted in FIG. 5 are executed via the CPU 112 a loading the applying program stored in the flash memory 112 b into the RAM 112 c.
- the UI unit 301 is achieved by the CPU 112 a, the flash memory 112 b, the RAM 112 c, the interface 112 d, and the input unit 116 .
- the decoding unit 303 , the applying unit 304 , the PMLKD decoding unit 305 , and the PMLKD applying unit 306 are achieved by the CPU 112 a, the flash memory 112 b, and the RAM 112 c.
- the medium recognizing unit 302 is achieved by the CPU 112 a, the flash memory 112 b, the RAM 112 c, the interface 112 d, and the medium driving apparatus 117 .
- FIG. 9 is a flowchart of an updating process.
- the updating process is achieved by executing the aforementioned applying program, and setting changes made by the portable medium 220 and a PMLKD 2 are achieved by performing the updating process.
- FIG. 9 does not indicate the portion related to a setting change made by displaying the change history screen 710 .
- the following will describe the updating process in detail. Assume that the configuration illustrated in FIG. 11 is the configuration of the CL apparatus 30 that performs the updating process. More particularly, assume that the applying program is executed by the CPU 112 a of the SVP 112 .
- the CPU 112 a causes the display apparatus 107 of the input unit 116 to display the selection screen 610 (SC 11 ).
- the CPU 112 a monitors, via the interface 112 d, an operation performed by the operator on the operation unit 116 b of the input unit 116 and determines whether the type of data selected by the operator is model lock data, i.e., encrypted data input using the portable medium 220 (SC 12 ).
- SC 12 portable medium 220
- SC 13 -SC 18 a process is performed for achieving a setting change using the portable medium 220 .
- the CPU 112 a instructs the medium driving apparatus 117 to read encrypted data stored in the portable medium 220 that has been set up.
- the CPU 112 a decodes the encrypted data read from the portable medium 220 (SC 14 ).
- the CPU 112 a causes the display unit 116 a of the input unit 116 to display model lock data obtained via the decoding, i.e., the setting value of each model lock word (SC 15 ).
- the operator checks details of the model lock data displayed on the display unit 116 a and, if appropriate, orders updating.
- the CPU 112 a performs monitoring via the interface 112 d so as to determine whether the operator operates the operation unit 116 b of the input unit 116 to order updating (SC 16 ).
- SC 16 order updating
- a judgment of YES is indicated in SC 16 , shifting the flow to SC 17 .
- a judgment of NO is indicated in SC 16 , shifting the flow to SC 18 .
- the CPU 112 a overwrites model lock data within setting data 314 stored in the flash memory 112 b with the decoded model lock data.
- the CPU 112 a stores the decoded model lock data, together with the current time and date, in the history DB 313 configured in the flash memory 112 b.
- the decoded model lock data is applied in this way, and the flow then shifts to SC 18 .
- the CPU 112 a causes the display unit 116 a of the input unit 116 to display the result of the applying.
- model lock data i.e., when the flow shifts from SC 17 to SC 18
- the CPU 112 a causes the display unit 116 a to display a screen to report to the operator that the applying has been appropriately finished.
- model lock data is not applied, i.e., when the flow shifts from SC 16 to SC 18
- the CPU 112 a causes the display unit 116 a to display a screen to report to the operator that a setting change was not made. Then, the updating process ends.
- SC 19 -SC 24 i.e., steps to which the flow shifts when a judgment of NO is indicated in SC 12 , a process is performed for achieving a setting change by manually inputting a PMLKD 2 .
- the CPU 112 a causes the display unit 116 a of the input unit 116 to display the PMLKD entry screen 620 , and inputs a PMLKD 2 in accordance with the operator's operation on the operation unit 116 b.
- the CPU 112 a decodes the input PMLKD 2 using a serial ID as the decode key 312 (SC 20 ).
- SC 21 decoded setting value
- the operator checks a setting value displayed for each model lock word on the display unit 116 a and, if appropriate, orders updating.
- the CPU 112 a performs monitoring via the interface 112 d so as to determine whether the operator operates the operation unit 116 b of the input unit 116 to order updating (SC 22 ).
- SC 22 order updating
- a judgment of YES is indicated in SC 22 , shifting the flow to SC 23 .
- a judgment of NO is indicated in SC 22 , shifting the flow to SC 24 .
- the CPU 112 a overwrites any of the setting values of the model lock words within setting data 314 stored in the flash memory 112 b with the decoded setting value of a model lock word obtained by decoding the model-lock-word class data.
- the CPU 112 a stores the setting value of the model lock word obtained by decoding the model-lock-word class data in the history DB 313 configured in the flash memory 112 b, together with the current time and date.
- the setting change based on a PMLKD 2 is made in this way, and the flow then shifts to SC 18 .
- SC 24 the CPU 112 a performs monitoring via the interface 112 d so as to determine whether the operator operates the operation unit 116 b of the input unit 116 to order re-inputting (SC 24 ).
- SC 24 a judgment of YES is indicated in SC 24 , shifting the flow to SC 19 , where the display unit 116 a displays the PMLKD entry screen 620 again.
- SC 24 a judgment of NO is indicated in SC 24 , shifting the flow to SC 18 .
- the CPU 112 a causes the display unit 116 a to display a screen to report to the operator that the applying has been appropriately finished.
- the CPU 112 a causes the display unit 116 a to display a screen to report to the operator that a setting change was not made. Then, the updating process ends.
- an instruction to re-input the PMLKD 2 can be given to an operator who checks the result of decoding. This is because, in the case of a manually input PMLKD 2 , inputting may possibly be mistakenly performed.
- the PMLKD entry screen presented when the flow returns to SC 19 displays, for each input PMLKD 2 , the class and the setting value of a model lock word, thereby allowing the operator to more easily identify a PMLKD 2 that has been mistakenly input.
- one PMLKD 2 is created for each model lock word, but one PMLKD 2 may be created for each set of a plurality of model lock words.
- An operator may select the classes of model lock words to be gathered and the number (combination) of the model lock words.
- a PMLKD 2 may be input not only in a manual manner but also using a scanner or the like. This is because a PMLKD 2 is transmittable using a facsimile or the like.
- the operator may arbitrarily select the form of outputting a PMLKD 2 .
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Software Systems (AREA)
- Computer Hardware Design (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Mathematical Physics (AREA)
- Computing Systems (AREA)
- Multimedia (AREA)
- Technology Law (AREA)
- Storage Device Security (AREA)
- General Health & Medical Sciences (AREA)
- Bioethics (AREA)
- Health & Medical Sciences (AREA)
Abstract
A setting-data encrypting apparatus includes an input device, a processor, and an output device. Setting data is input from the input device. The setting data indicates a detail to be newly set to an information processing apparatus whose performance-related setting is to be changed. The processor encrypts the setting data input via the input device. And the output device outputs encrypted data in a character string format.
Description
- This application is based upon and claims the benefit of priority of the prior Japanese Patent Application No. 2013-118892, filed on Jun. 5, 2013, the entire contents of which are incorporated herein by reference.
- The embodiments discussed herein are related to a technology for changing a setting related to a performance of an information processing apparatus such as a server.
- Currently, some makers that sell or rent information processing apparatuses such as servers (hereinafter referred to as “servers”) provide servers whose settings related to performance are changeable. The settings related to performance include the number of CPUs (Central Processing Units) actually operated on a server, the amount of available memory, the enabling or disabling of an option function, and so on.
- Makers that provide such a server whose settings are changeable ordinarily charge fees in accordance with the settings. A “setting” hereinafter refers to a factor related to performance that changes a price (selling price or rental fee (fee for use)), unless otherwise noted. Setting data will hereinafter be referred to as “model lock data”.
- A customer who uses a server whose settings are changeable may change a setting in accordance with a performance that the server to have. As an example, in one measure, the customer may suppress the amount of payment by selecting a low-performance setting when a relatively small amount of data is predicted to be processed, and may select a higher-performance setting when the amount of data to be processed increases. Alternately, the customer may take the opposite measure. A performance may be changed by changing a setting, and hence the server itself would not be changed. Accordingly, a server whose settings are changeable allows a customer to suppress the amount of payment and is capable of performing desired data processing, thereby offering high convenience. An amount paid by a customer will hereinafter be referred to as a “fee for use” for convenience.
-
FIG. 1 illustrates examples of model lock data. Model lock data 1 (1-1 to 1-8) inFIG. 1 is intended to change a plurality of setting items.FIG. 1 indicates only “model ID”, “number of CPUs”, and “clock” as setting items. The setting items are indicated as “model lock words”. - The “model ID” is a model lock word (setting item) for roughly grading a performance. In
FIG. 1 , a model ID of a higher value leads to a higher performance. The “number of CPUs” is a model lock word that designates the number of CPUs actually operated, and the “clock” is a model lock word that designates a clock frequency at which a CPU is operated. - The
model lock data 1 depicted inFIG. 1 not only relates to a fee for use collected from a customer but also directly affects a performance of a server used by the customer. Thus, themodel lock data 1 is confidential. Accordingly, themodel lock data 1 is encrypted before being input to a server. - For encryption of the
model lock data 1, a common key cryptography is typically used wherein the same key is also used for decoding. Unique information that is different for each server is usually used as a key. Hence, only an objective server can change a setting indicated by encryptedmodel lock data 1 without a key being input. - The maker encrypts the
model lock data 1. A server used by a customer is not necessarily located within a facility managed by the maker (e.g., data center). The server is not necessarily connected to a maker-side terminal apparatus via a network. Maker-side terminal apparatuses are not used for management of the server or the like, and hence there is very little need to connect such terminal apparatuses to the server. In some cases, the server is not connected to any external element. Accordingly, the actual situation is that a network environment is expectable wherein a maker-side terminal apparatus is connectable to the server. - A customer engineer (CE) inputs model lock data to the server partly because such a network environment is unexpectable. Encrypted
model lock data 1 is expressed using binary numbers and has a large bit count. Hence, a typical way to input encryptedmodel lock data 1 is to record the encryptedmodel lock data 1 in a portable recording medium and cause the server to read the recording medium. - To cause the server to read the recording medium in which the encrypted
model lock data 1 is recorded, the maker prepares and delivers the recording medium. Alternatively, the maker transmits encryptedmodel lock data 1 via a network to a terminal apparatus operated by the CE, and the receivedmodel lock data 1 is written to a recording medium accessible from the terminal apparatus. However, in both of the methods, it may be difficult to quickly change a setting of the server. - In the method wherein the maker prepares a recording medium, it takes time to deliver the recording medium, thereby making it difficult to quickly change a setting of the server. In the method wherein
model lock data 1 is transmitted via a network, themodel lock data 1 may be incapable of being transmitted via the network. It is also possible that the CE does not have a terminal apparatus capable of accessing a recording medium that the server can read, or that an available recording medium is not present. Both of these possibilities hinder the quick changing of a setting of the server. - A customer may possibly request that a setting of a server be urgently changed. In consideration of the possibility, it is important to ensure that the settings of a server can be changed quickly.
- Patent document 1: Japanese Laid-open Patent Publication No. 2003-303028
- Patent document 2: Japanese Laid-open Patent Publication No. 2007-11944
- According to an aspect of the embodiments, one system to which the invention has been applied includes an input device, a processor, and an output device. Setting data is input from the input device. The setting data indicates a detail to be newly set to an information processing apparatus whose performance-related setting is to be changed. The processor encrypts the setting data input via the input device. And the output device outputs encrypted data in a character string format.
- The object and advantages of the invention will be realized and attained by means of the elements and combinations particularly pointed out in the claims.
- It is to be understood that both the foregoing general description and the following detailed description are exemplary and explanatory and are not restrictive of the invention.
-
FIG. 1 illustrates examples of model lock data; -
FIG. 2 illustrates a method for changing a setting related to a performance of an information processing apparatus, the method being achieved in accordance with the embodiment; -
FIG. 3 is a flowchart illustrating an exemplary sequence of an operation of changing a setting related to a performance of an information processing apparatus in accordance with the embodiment; -
FIG. 4 illustrates an exemplary functional configuration of a setting-data encrypting apparatus in accordance with the embodiment; -
FIG. 5 illustrates an exemplary functional configuration of a CL apparatus that is an information processing apparatus in accordance with the embodiment; -
FIG. 6 illustrates examples of a selection screen and a PMLKD entry screen, both displayed by a CL apparatus; -
FIG. 7 illustrates an exemplary change-history screen; -
FIG. 8 is a flowchart of a data creating process; -
FIG. 9 is a flowchart of an updating process; -
FIG. 10 illustrates an exemplary configuration of an information processing apparatus usable as a setting-data encrypting apparatus in accordance with the embodiment; and -
FIG. 11 illustrates an exemplary configuration of a CL apparatus that is an information processing apparatus in accordance with the embodiment. - The following will describe embodiments of the invention in detail by referring to the drawings.
-
FIG. 2 illustrates a method for changing a setting related to a performance of an information processing apparatus, the method being achieved in accordance with the embodiment.FIG. 3 is a flowchart illustrating an exemplary sequence of an operation of changing a setting related to a performance of an information processing apparatus in accordance with the embodiment. First, with reference toFIGS. 2 and 3 , specific descriptions will be given of a changing method achieved by the embodiment and a sequence of an operation of achieving the changing method. - In
FIG. 2 , numeral 20 indicates a terminal apparatus (e.g., PC (Personal Computer)) installed in amass-production factory where a maker manufactures information processing apparatuses, and numeral 30 indicates an information processing apparatus delivered to a customer. Theterminal apparatus 20 is an information processing apparatus mounted with a setting-data encrypting apparatus in accordance with the embodiment, and theinformation processing apparatus 30 is an information processing apparatus in accordance with the embodiment. Theinformation processing apparatus 30 fabricated by the maker will hereinafter be referred to as a “CL apparatus”. Note that “CL” means “Client”. - At a request from the customer, an operator who operates the
terminal apparatus 20 in the mass-production factory creates model lock data. The embodiment is based on the premise that, as depicted inFIG. 1 , a plurality of model lock words (items) are present as model lock data. - In the embodiment, an operator (CE) can manually change a setting of the
CL apparatus 30. In the embodiment, a setting can be changed for each model lock word so that the amount of data manually input by the operator can be minimized. “PMLKD” inFIG. 2 , which indicates Partial Model Lock DATA, is data for changing the setting of one model lock word. - To enable a setting to be changed for each model lock word, a PMLKD specify a corresponding model lock word. Accordingly, in the embodiment, data indicating a model lock word (hereinafter referred to as “model-lock-word class data”) and data indicating the setting of the model lock word (hereinafter referred to as a “setting value”) are gathered and encrypted.
- Numeral 2 in
FIG. 2 indicates an encrypted PMLKD or, more precisely, a PMLKD output from theterminal apparatus 20. “A2EG78-IS2261” indicates as examples the details of a PMLKD2 that has been output. Note thatnumeral 2 is assigned only to a PMLKD in a character string format. - For encryption, a common key cryptography is typically used wherein the same key is also used for decoding. Unique information that is different for each
CL apparatus 30 is used as a key. The following descriptions are based on the assumption that serial IDs (IDentifers) serve as the unique information. - As depicted in
FIG. 2 , in the embodiment, aPMLKD 2 is output in a character string format (in this example, alphanumeric character string format). This is attributed to the advantages of a small number of digits (characters) and easy recognition of details in comparison with data expressed as binary numbers. These advantages allow thePMLKD 2 to be correctly and quickly input in a manual manner. Allowing a setting to be changed for each model lock word has the advantage of decreasing the number of characters of thePMLKD 2. - A
PMLKD 2 is output using a data representation that can be easily input in a manual manner, thereby decreasing the case to record thePMLKD 2 in a recording medium. This is because information indicating thePMLKD 2 can be transmitted to an operator who is in charge of the changing of a setting of acustomer CL apparatus 30, so that the operator can appropriately change the setting of theCL apparatus 30. - To transmit information indicating the PMLKD2, various electronic transmission techniques are useable. In addition to e-mail, telephone, facsimile, and so on are usable as the electronic transmission techniques. In this way, an increased number of options are available in the transmitting of information, so that a maker (or a vendor) can select a proper option in accordance with a customer. Such an improvement in convenience ensures that information is quickly transmitted to an operator at a customer's site. Information to be transmitted is data in a character string format, which has a small number of digits and is easily recognized in comparison with data expressed as binary numbers. This allows a setting of the
CL apparatus 30 to be quickly and correctly changed at a request from a customer. - The sequence of the operation represented in
FIG. 3 enables changing a setting of theCL apparatus 30 through creation of aPMLKD 2. - The
terminal apparatus 20 stores a program used to create a PMLKD 2 (hereinafter referred to as a “model lock tool”). To create aPMLKD 2, the operator causes theterminal apparatus 20 to execute the model lock tool so as to input data to create a PMLKD 2 (SM2). Data to be input (or designated) by the operator at least includes unique information (serial ID) assigned to anobjective CL apparatus 30, the class of an objective model lock word, and a setting value indicating a detail to be newly set by that class of model lock word. In the embodiment, theterminal apparatus 20 also adds a dummy and check data set by a password of theterminal apparatus 20. A model-lock-word class and a setting value is to be input for each model lock word. Check data is used to check whether an error has occurred in a data constellation of a dummy, model-lock-data class data, and setting-value data. A dummy, which is data used to improve confidentiality, makes it more difficult to guess a model lock word and a setting value thereof. - Inputting all data that to be input (designated), the operator instructs the model lock tool to create a
PMLKD 2. In accordance with the instruction, theterminal apparatus 20 that executes the model lock tool gathers and encrypts, for each model lock word, model-lock-word class data and setting-value data of the model lock word by using input unique information, and outputs the resultant data in a character string format (SM2). - The
PMLKD 2 output in a character string format is reported by a mass-production factory operator (e.g., an operator who operates the terminal apparatus 20) to an operator at a customer's site using e-mail, telephone, facsimile, or the like. - The operator at a customer's site manually inputs the reported
PMLKD 2 to theCL apparatus 30 and orders application of the PMLKD 2 (SC1). In response to the order, theCL apparatus 30 decodes theinput PMLKD 2 using the serial ID of itself (SC2). After the decoding, theCL apparatus 30 determines whether the decoded check data is identical with the check data obtained from the decoded dummy, the decoded model-lock-data class data, and the decoded setting-value data (SC3). When those pieces of check data are identical with each other (Yes in SC3), theCL apparatus 30 changes a setting in accordance with the input PMLKD 2 (SC4). When those pieces of check data are not identical with each other (No in SC3), theCL apparatus 30 reports to the operator that an error has occurred, without changing a setting in accordance with the input PMLKD 2 (SC5). -
FIG. 4 illustrates an exemplary functional configuration of a setting-data encrypting apparatus in accordance with the embodiment. Next, with reference toFIG. 4 , descriptions will be given in detail of a setting-data encrypting apparatus in accordance with the embodiment mounted on theterminal apparatus 20. - As illustrated in
FIG. 4 , the setting-data encrypting apparatus in accordance with the embodiment includes a UI (User Interface)unit 201, adata creating unit 202, an encryptingunit 203, amedium creating unit 204, a PMLKD-data creating unit 205, and aPMLKD encrypting unit 206. Thedata creating unit 202, the encryptingunit 203, and themedium creating unit 204 are functions to record encrypted model lock data in a portable recording medium 220 (indicated as a “portable medium” inFIG. 4 , and such an expression will be used hereinafter). Note that the expression “create theportable medium 220” will hereinafter mean recording encrypted model lock data in theportable medium 220. The PMLKD-data creating unit 205 and thePMLKD encrypting unit 206 are functions for creating and outputting aPMLKD 2. - The
UI unit 201 is a function to create a screen presented to an operator who operates theterminal apparatus 20 and to allow the operator to input data (including, in this example, various instructions and so on). And theUI unit 201 obtains the input data. TheUI unit 201 first displays a selection screen to allow the operator to select an object to be created. As a result of the selection, one of theportable medium 220 or thePMLKD 2 is specified as an object to be created. Then, theUI unit 201 causes the operator to input data that depends on the result of the selection. - Data is input in the order of, for example, the inputting of the serial ID of a
CL apparatus 30 for which a setting is to be changed→the inputting of setting-value data. A creation history database (DB) 211 stores, for eachCL apparatus 30, setting-value data input in the past. A serial ID is data for unique identification of aCL apparatus 30. In the embodiment, a serial ID is initially input so that the operator can check setting-value data input in the past. - When the operator selects creation of a
PMLKD 2, theUI unit 201 displays an entry screen to allow the operator to input a serial ID. The serial ID input by the operator using the entry screen is reported from theUI unit 201 to the PMLKD-data creating unit 205. The serial ID is saved as anencryption key 213. - The PMLKD-
data creating unit 205 searches thecreation history DB 211 using the reported serial ID as a key and, for each model lock word, extracts the most recently designated setting value and a creation date. The model lock words include those that have been changed due to a creation of aportable medium 220, so that the operator can check the current setting value of each model lock word. - The pieces of extracted data are reported from the PMLKD-
data creating unit 205 to theUI unit 201, which displays a setting-value entry screen in which the pieces of reported data are arranged in a time sequence. The history displayed on the screen is the one depicted inFIG. 7 . -
FIG. 7 illustrates a change-history screen 701 indicating the history of a setting change made in the past by theCL apparatus 30. For each model lock word for which a setting value has been changed, the change-history screen 701 includes a character string indicating the class of the model lock word, setting-value data, and a date on which a setting was changed (including time, in this example). The character-string expressions “CPU NUMBER”, “MSU SIZE”, and “ESA MODE” respectively indicate the number of CPUS, the capacity of a main storage, and an ESA (Enterprise Service Architecture) mode. As an example, “4 CPU” means four CPUs, and “512 MB” means that a main storage has a capacity of 512 MB. ESA is a specification that supports all principal functions of SOA (Service Oriented Architecture), and “ENABLE”, indicated as a setting value of the ESA mode, means that the ESA mode has been enabled. - The setting-value entry screen also displays, for each model lock word, a list of a character string indicating a model-lock-word class, a setting value, and a date. Accordingly, while checking current settings, the operator selects a model lock word for which a setting is to be changed, and inputs the setting value. The selected model lock word and the input setting value are reported from the
UI unit 201 to the PMLKD-data creating unit 205 when, for example, the operator indicates the end of the inputting. - Some model lock words have a setting value that is to be determined in accordance with the setting value of another model lock word. To achieve, for example, a higher performance, it is desirable to set a larger number as the number of CPUs and to set a larger capacity as the capacity of the main storage. Accordingly, a situation in which a maximum number is set as the number of CPUs and, simultaneously, a minimum capacity is set as the capacity of the main storage, is likely to be contrary to the user's intentions. Accordingly, in the embodiment, setting-
value information 212 is prepared to determine whether a setting value input by a model lock word of a class selected by the operator is valid. - When the
UI unit 201 reports a selected model lock word and an input setting value, the PMLKD-data creating unit 205 refers to setting-value information 212 and determines whether the setting value input by the model lock word is valid. Determining that the setting value is invalid, the PMLKD-data creating unit 205 reports this fact to theUI unit 201. In response to the report, theUI unit 201 displays a setting entry screen that, for example, includes a message to urge the operator to check the input information. This at least disables the inputting of a setting value judged to be invalid. - When determining that setting values are valid, the PMLKD-
data creating unit 205 reports, for each model lock word, a class and a setting value thereof to thePMLKD encrypting unit 206. In response to the report, using a serial ID as an encryption key, thePMLKD encrypting unit 206 gathers and encrypts, for each model lock word, a setting value and class data indicating the class of the model lock word. A PMLKD, i.e., encrypted data obtained via the encrypting, is reported to theUI unit 201 via the PMLKD-data creating unit 205. - The
UI unit 201 displays a reported PMLKD in a character string format. This allows the operator to convey the displayedPMLKD 2 to another operator at the customer's site using various electronic transmission techniques such as e-mail, telephone, and facsimile. - When the operator selects the creation of a
portable medium 220 on a selection screen displayed by theUI unit 201, theUI unit 201 displays an entry screen to allow the operator to input the serial number of aCL apparatus 30 for which a setting is to be changed. TheUI unit 201 reports, to thedata creating unit 202, the serial ID input on the entry screen by the user. The serial ID is saved as anencryption key 213. - Using the reported serial ID as a key, the
data creating unit 202 searches thecreation history DB 211 and extracts, for each model lock word for which aPMLKD 2 was created in the past or for which a setting value was changed in the past, a model-lock-word class data, a setting value, and a creation date. Those pieces of extracted data are reported from thedata creating unit 202 to theUI unit 201, which displays a setting-value entry screen in which the pieces of reported data are arranged. - While checking current settings, the operator selects a model lock word for which a setting is to be changed, and inputs the setting value. The selected model lock word and the input setting value are reported from the
UI unit 201 to thedata creating unit 202 when, for example, the operator indicates the end of the inputting. - As with the PMLKD-
data creating unit 205, thedata creating unit 202 refers to setting-value information 212 to determine, for each selected model lock word, whether an input setting value is valid. When a model lock word is judged to be invalid, thedata creating unit 202 reports this fact to theUI unit 201. In response to the report, theUI unit 201 displays a setting entry screen that, for example, includes a message to urge the operator to check input information. This at least invalidates the inputting of a setting value judged to be invalid. - When determining that setting values are valid, the
data creating unit 202 reports, for each model lock word, a class and a setting value thereof to theencrypting unit 203. For a model lock word for which the operator has not input a setting value, a latest setting value stored in thecreation history DB 211 is reported to theencrypting unit 206. Accordingly, using a serial ID as an encryption key, the encryptingunit 203 gathers and encrypts the setting values of all of the model lock words, i.e., pieces of model lock data. The encrypted data (model lock data) obtained via the encrypting is reported to themedium creating unit 204. - The
medium creating unit 204 writes, to aportable medium 220 set up by the operator, the encrypted data reported from the encryptingunit 203. After writing the encrypted data, themedium creating unit 204 reports this fact to theencrypting unit 203. - In response to the report, the encrypting
unit 203 reports to thedata creating unit 202 data indicating the completion of the encrypting. Upon receipt of the report, thedata creating unit 202 reports to theUI unit 201 the completion of the creating of theportable medium 220. In response to the report, theUI unit 201 displays a screen for reporting the completion of the creating of theportable medium 220 to the operator. -
FIG. 10 illustrates an exemplary configuration of an information processing apparatus usable as a setting-data encrypting apparatus in accordance with the embodiment. Referring toFIG. 10 , the following will specifically describe an exemplary configuration of the setting-data encrypting apparatus in accordance with the embodiment, i.e., an information processing apparatus usable as theterminal apparatus 20 used at a mass-production factory. - As depicted in
FIG. 10 , the information processing apparatus includes aCPU 101, aROM 102, a memory (memory module) 103, an NIC (Network Interface Card) 104, a hard disk apparatus (HD) 105, amedium driving apparatus 106, adisplay apparatus 107, aninput device 108, and acontroller 109. This configuration is an exemplary information processing apparatus usable as theterminal apparatus 20, and the configuration of the information processing apparatus that achieves the setting-data encrypting apparatus in accordance with the embodiment is not limited to the one depicted inFIG. 10 . - The
ROM 102 is a memory that stores a BIOS (Basic Input/Output System). TheCPU 101 loads the BIOS into thememory 103 to execute this system. Thehard disk apparatus 105 stores an OS (Operating System) and various programs that include a model lock tool operated on the OS (e.g., an application program, which will hereinafter be referred to as an “application”). After the activation of the BIOS is completed, using thecontroller 109, theCPU 101 may read from thehard disk apparatus 105 the OS and various programs to be executed, and may load the OS and the various programs into thememory 103 to execute them. Activation of the BIOS or the OS enables a communication to be performed via theNIC 104. - The
NIC 104 enables a communication to be performed via a network such as a LAN (Local Area Network). An electronic transmission of information on aPMLKD 2 relayed via e-mail, telephone, facsimile, or the like can be performed using theNIC 104. - The
medium driving apparatus 106, thedisplay apparatus 107, and theinput device 108 are connected to thecontroller 109 together with thehard disk apparatus 105. Via thecontroller 109, theCPU 101 controls themedium driving apparatus 106, displays information on thedisplay apparatus 107, and recognizes an operation performed using theinput device 108. All of themedium driving apparatus 106, thedisplay apparatus 107, and theinput device 108 may be detachable elements. - The
medium driving apparatus 106 is accessible to theportable medium 220. Thedisplay apparatus 107 is used to display various screens. Theinput device 108, which includes, for example, a keyboard and a pointing device, enables the inputting of various pieces of data and allows various instructions to be given. - As described above, a model lock tool is an application operated on, for example, an OS. The model lock tool is stored in the
hard disk apparatus 105. Thecreation history DB 211 and setting-value information 212 are also saved in, for example, thehard disk apparatus 105. Theencryption key 213 is saved in thememory 103. In such a situation, theUI unit 201 is achieved by theCPU 101, theROM 102, thememory 103, thehard disk apparatus 105, thedisplay apparatus 107, theinput device 108, and thecontroller 109. - The
data creating unit 202, the encryptingunit 203, the PMLKD-data creating unit 205, and thePMLKD encrypting unit 206, are achieved by theCPU 101, theROM 102, thememory 103, thehard disk apparatus 105, and thecontroller 109. Themedium creating unit 204 is achieved by theCPU 101, theROM 102, thememory 103, thehard disk apparatus 105, themedium driving apparatus 106, and thecontroller 109. -
FIG. 8 is a flowchart of a data creating process. The data creating process is achieved by executing the aforementioned model lock tool, and theportable medium 220 and aPMLKD 2 are created by the data creating process.FIG. 8 depicts a flow from activation to creation of theportable medium 220 or aPMLKD 2. With reference toFIG. 8 , the following will describe the data creating process in detail. Assume that the configuration of theterminal apparatus 20 that performs the data creating process is the one depicted inFIG. 10 . - First, the
CPU 101 causes thedisplay apparatus 107 to display a selection screen (SM11). Then, using thecontroller 109, theCPU 101 monitors an operation performed on theinput device 108 by the operator so as to determine whether aportable medium 220 is selected as an object to be created (SM12). When the operator chooses to create theportable medium 220, a judgment of YES is indicated in SM12, shifting the flow to SM13. When the operator chooses to create aPMLKD 2, a judgment of NO is indicated in SM12, shifting the flow to SM20. - In SM13, the
CPU 101 causes thedisplay apparatus 107 to display a screen for allowing the operator to input a serial ID. The operator operates theinput device 108 to input a serial ID and indicates the completion of the inputting, and, responsively, theCPU 101 searches thecreation history DB 211 using the serial ID as a key and extracts a complete set of model lock data after the final data creation (SM14). TheCPU 101 causes thedisplay apparatus 107 to display a setting-value entry screen indicating the complete set of model lock data that has been extracted (SM14). - Using the
input device 108, the operator selects a model lock word for which a setting value is to be changed within the displayed model lock data, and inputs a new setting value. Using thecontroller 109, theCPU 101 monitors the operation performed on theinput device 108 by the operator and inputs the setting value (SM15). When the operator indicates the completion of the inputting of a setting value, theCPU 101 refers to setting-value information 212 to check the validity of a setting value input for each model lock word by the operator (SM16). After the checking, the flow shifts to SM17. - In SM17, the
CPU 101 determines whether the result of the checking is valid. When all of the setting values input by the operator are judged to be valid, a judgment of YES is indicated in SM17, shifting the flow to SM18. When any of the setting values input by the operator is judged to be invalid, a judgment of NO is indicated in SM17, returning the flow to SM14. Then, the operator inputs a setting value again. In the displaying of setting values in SM14 after the returning, setting values input by the operator may be displayed while highlighting a setting value estimated to be inappropriate. - In SM18, using the input serial ID as the
encryption key 213, theCPU 101 gathers and encrypts the setting values on the setting-value entry screen. Using thecontroller 109, theCPU 101 outputs encrypted model lock data obtained via the encrypting to themedium driving apparatus 106 and stores the encrypted data in theportable medium 220 set up at the medium driving apparatus 106 (SM19). In addition, using thecontroller 109, theCPU 101 stores, together with the current time and date, the encrypted model lock data in thecreation history DB 211 configured on the hard disk apparatus 105 (SM19). Subsequently, using thecontroller 109, theCPU 101 causes thedisplay apparatus 107 to display information indicating that the creation of theportable medium 220 has been successfully finished (SM19). After the result is displayed in this manner, the data creating process is finished. - In SM20, i.e., a step to which the flow shifts when a judgment of NO is indicted in SM12, the
CPU 101 causes thedisplay apparatus 107 to display a screen for allowing the operator to input a serial ID. The operator operates theinput device 108 to input a serial ID and indicates the completion of the inputting, and, responsively, theCPU 101 searches thecreation history DB 211 using the serial ID as a key and extracts a complete set of currently enabled model lock data (SM21). TheCPU 101 causes thedisplay apparatus 107 to display a setting-value entry screen indicating the complete set of model lock data that has been extracted (SM21). - With the setting-value entry screen, the operator selects a model lock word for which a setting value is to be input, and inputs the setting value. Using the
controller 109, theCPU 101 monitors the operation performed on theinput device 108 by the operator and enables the selecting of a model lock word and the inputting of a setting value (SM22). When the operator indicates the completion of the inputting of a setting value, theCPU 101 refers to setting-value information 212 to check the validity of a setting value input for each model lock word selected by the operator (SM23). After the checking, the flow shifts to SM24. - In SM24, the
CPU 101 determines whether the result of the checking is valid. When all of the setting values input by the operator are judged to be valid, a judgment of YES is indicated in SM24, shifting the flow to SM25. When any of the setting values input by the operator is judged to be invalid, a judgment of NO is indicated in SM24, returning the flow to SM21. Then, the operator inputs a setting value again. In the displaying of setting values in SM21 after the returning, a setting value estimated to be inappropriate maybe deleted, and the inputting of a new setting value may be demanded. - In SM25, using the input serial ID as the
encryption key 213, theCPU 101 gathers and encrypts model-lock-word class data and a setting value for each model lock word selected on the setting-value entry screen (SM25). Using thecontroller 109, theCPU 101 causes thedisplay apparatus 107 to display, for example, thePMLKD 2 obtained via the encrypting and a message reporting that the creation of thePMLKD 2 has been successfully finished (SM25). In addition, using thecontroller 109, for each encrypted model lock word, theCPU 101 stores, together with the current time and date, model-lock-word class data and a setting value in thecreation history DB 211 configured on the hard disk apparatus 108 (SM25). Then, the data creating process is finished. - As described above, in the embodiment, a
portable medium 220 or aPMLKD 2 is created in accordance with the operator's selection. This aims to allow the operator to choose the better option in accordance with the situation. - The following will specifically describe the
CL apparatus 30. -
FIG. 5 illustrates an exemplary functional configuration of a CL apparatus that is an information processing apparatus in accordance with the embodiment. As depicted inFIG. 5 , theCL apparatus 30 includes aUI unit 301, amedium recognizing unit 302, adecoding unit 303, and an applyingunit 304, aPMLKD decoding unit 305, and aPMLKD applying unit 306. - The
UI unit 301 is a function to create a screen presented to an operator who operates theCL apparatus 30 and to allow the operator to input data (including various instructions and so on, in this example). And theUI unit 301 obtains the input data. Themedium recognizing unit 302, thedecoding unit 303, and the applyingunit 304 are functions to enable a setting change that depends on theportable medium 220, and thePMLKD decoding unit 305 and thePMLKD applying unit 306 are functions to enable a setting change that depends on a manually inputPMLKD 2. TheUI unit 201 first displays a selection screen to allow the operator to select the type of data to be input to theCL apparatus 30. The options are model lock data and aPMLKD 2, both stored in theportable medium 220. -
FIG. 6 illustrates examples of a selection screen and a PMLKD entry screen, both displayed by a CL apparatus. - As depicted in
FIG. 6 , in aselection screen 610, the type of data to be input is selected by inputting value “1” or “2”. The character string “1. MODEL LOCK PACKAGE” on theselection screen 610 indicates that “1” is to be input when it is desirable to input data using theportable medium 220. The character string “2. PARTIAL MODEL LOCK DATA” indicates that “2” is to be input when it is desirable to manually input aPMLKD 2. - When the operator inputs “2” and orders execution on the
selection screen 610, theUI unit 301 displays aPMLKD entry screen 620 as depicted inFIG. 7 . The portion that follows the character string “ITEM01 WORD:” on thePMLKD entry screen 620 is an area in which aPMLKD 2 is input, and “123456” and “7890AB” in “123456-7890AB” indicate the actually inputPMLKDs 2. In thePMLKD entry screen 620 inFIG. 7 , the portions that follow the character strings other than the character string “ITEM01 WORD:”, i.e., “ITEM02 WORD:” to “ITEM10 WORD:”, are also areas in which PMLKDs 2 are input. “XXXXXX” and “XXXXXX” in “XXXXXX-XXXXXX” indicate that aPMLKD 2 has not been input. In accordance with an instruction from the operator, thePMLKD 2 input on thePMLKD entry screen 620 is reported from theUI unit 301 to thePMLKD decoding unit 305. - Upon receipt of the
PMLKD 2, thePMLKD decoding unit 305 decodes thePMLKD 2 using the serial ID of this unit as adecode key 312. For each decodedPMLKD 2, thePMLKD decoding unit 305 reports to theUI unit 301 model-lock-word class data and a setting value obtained via the decoding. - As depicted in
FIG. 1 , a model lock word has a model ID. For each setting value settable as a model ID, the setting value of each model lock word is stored in a basic data table 311. When a decodedPMLKD 2 has a model lock ID as a model lock word, thePMLKD decoding unit 305 reports to theUI unit 301 the setting value of each corresponding model lock word in addition to, for example, the setting value of the model ID. - The
UI unit 301 displays a model lock word and a setting value indicated by reported model-lock-word class data, and the operator checks the displayed information. Then, when the operator orders an application execution, theUI unit 301 reports this fact to thePMLKD decoding unit 305. When the operator orders re-inputting, theUI unit 301 displays thePMLKD entry screen 620 again. When the operator orders cancellation, theUI unit 301 displays, for example, theselection screen 610 again. - In response to the report of the application execution from the
UI unit 301, for each decodedPMLKD 2, thePMLKD decoding unit 305 reports, to thePMLKD applying unit 306, model-lock-word class data and a setting value obtained via the decoding, and orders an application execution. - Model lock data, i.e., the setting value of each model lock word, is saved as a portion of setting
data 314. In response to the ordered application execution, thePMLKD applying unit 306 converts the setting value of a model lock word for which a setting value has been reported by thePMLKD decoding unit 305 into the reported setting value. - In response to the application execution reported from the
UI unit 301, for each decodedPMLKD 2, thePMLKD decoding unit 305 stores, in a history database (DB) 313, model-lock-word class data and a setting value obtained via the decoding, together with the current time and date. The current time and date is stored in thehistory DB 313 as an application time and date of the setting change at that time. - Meanwhile, when the operator inputs “1” on the
selection screen 610 and orders execution, theUI unit 301 makes a request for, for example, thedecoding unit 303 to read data from theportable medium 220. At the request from theUI unit 301, thedecoding unit 303 instructs themedium recognizing unit 302 to read data from theportable medium 220 that has been set. Themedium recognizing unit 302 is a function to access theportable medium 220 that has been set. Themedium recognizing unit 302 reads, in accordance with an instruction from thedecoding unit 303, data from theportable medium 220 that has been set, and reports the read data to thedecoding unit 303. The data read from theportable medium 220 is encrypted model lock data. When theportable medium 220 is not set up at themedium recognizing unit 302, this fact is reported via thedecoding unit 303 to theUI unit 301, which displays a message that urges theportable medium 220 to be set up. After the message is displayed, when the operator orders reading, theUI unit 301 again instructs thedecoding unit 303 to read data from theportable medium 220. - The
decoding unit 303 uses the serial ID of theCL apparatus 30 as thedecode key 312 so as to decode the encrypted data reported from themedium recognizing unit 302. Thedecoding unit 303 reports the model lock data obtained via the decoding to theUI unit 301. - The
UI unit 301 displays the model lock data reported from thedecoding unit 303, and the operator checks the displayed information. When the operator orders application after checking the information, theUI unit 301 instructs thedecoding unit 303 to apply the model lock data, i.e., to change a setting. - In accordance with the application order from the
UI unit 301, thedecoding unit 303 reports the model lock data to the applyingunit 304 and stores the model lock data in thehistory DB 313 together with the current time and date, i.e., the application time and date. - The applying
unit 304 replaces model lock data of settingdata 314 with the model lock data reported from thedecoding unit 303. Then, the applyingunit 304 reports to thedecoding unit 303 that the applying has been completed. - The completion of the applying is reported to the
UI unit 301 via thedecoding unit 303. Receiving the report of the completion of the applying, theUI unit 301 reports this fact to the operator by, for example, displaying such a message. - In addition to setting values currently applied for model lock words, setting values that were applied in the past are stored in the
history DB 313. Accordingly, the operator may instruct theUI unit 301 to display achange history screen 710 as depicted inFIG. 7 . To display thechange history screen 710, thedecoding unit 303 instructs, for example, thePMLKD decoding unit 305 to read data stored in thehistory DB 313. - The displayed
change history screen 710 may be used to restore settings. The embodiment offers a higher convenience by enabling a change to be made so as to return to a setting without using, for example, theportable medium 220. - A change for restoring a setting may be made, for example, by designating a line on the
change history screen 710 in which a setting value to be returned to is located and by ordering the setting change. Making such a setting change based on the returning of a setting value also updates settingdata 314 and thehistory DB 313. -
FIG. 11 illustrates an exemplary configuration of a CL apparatus that is an information processing apparatus in accordance with the embodiment. With reference toFIG. 11 , the following will specifically describe an exemplary configuration of theCL apparatus 30. - As illustrated in
FIG. 11 , theCL apparatus 30 includes a plurality of system boards (SBs) 111, a service processor (SVP) 112, adisk unit 113, acommunication interface 114, abus 115, aninput unit 116, and amedium driving apparatus 117. TheSBs 111, theSVP 112, thedisk unit 113, and thecommunication interface 114 are connected to thebus 115. - Each of the
SBs 111 is a processing module to allow theCL apparatus 30 to perform data processing and is mounted with a plurality ofCPUs 111 a and a plurality of DIMMs (Dual Inline Memory Modules) 111 b. Settings of “number of CPUs” and “capacity of main storage apparatus”, i.e., model lock words, designate, for example, the number ofSBs 111 actually operated from among all of theSBs 111. Alternatively, the settings designate the number ofCPUs 111 a actually operated and the number ofDIMMs 111 b used within eachSB 111 or designate the capacity of the DIMMs. - The
disk unit 113 is a module used to store various programs executed by eachSB 111 and data used by eachSB 111. Thedisk unit 113 is mounted with a plurality ofhard disk apparatuses 113 a as storage apparatuses. - The
communication interface 114 includes a plurality of communication ports to establish a connection to, for example, a network, and enables a communication with the network via each communication port. EachSB 111 may communicate with the network via thecommunication interface 114. - The
SVP 112, which is a module to manage the entirety of theCL apparatus 30, functions as one information processing apparatus. TheSVP 112 includes aCPU 112 a, aflash memory 112 b, a RAM (Read Only Memory) 112 c, and an interface (I/F) 112 d. - The
input unit 116 and themedium driving apparatus 117 are connected to theinterface 112 d. This allows theCPU 112 a to control theinput unit 116 and themedium driving apparatus 117 via theinterface 112 d. - The
medium driving apparatus 117 is accessible to theportable medium 220. Theinput unit 116, which is used by the operator to input data and give various instructions, includes adisplay unit 116 a and anoperation unit 116 b. Thedisplay unit 116 a displays various screens such as theselection screen 610 and thePMLKD entry screen 620 depicted inFIG. 6 and thechange history screen 710 depicted inFIG. 7 . Theoperation unit 116 b includes various keys and so on, and aPMLKD 2 is input by operating theoperation unit 116. - The
UI unit 301, themedium recognizing unit 302, thedecoding unit 303, the applyingunit 304, thePMLKD decoding unit 305, and thePMLKD applying unit 306 depicted inFIG. 5 are achieved by theSVP 112, theinput unit 116, and themedium driving apparatus 117. Thecreation history DB 211 is provided. Thehistory DB 313 is configured in, for example, theflash memory 112 b. Theflash memory 112 b also stores the basic data table 311, the decode key (serial ID) 312, and settingdata 314. - To activate, for example, the
SB 111, theCPU 112 a of theSVP 112 controls the activation of theSB 111 in accordance with settingdata 314 and gives instructions on various settings. This reflects the settings based on settingdata 314 in theCL apparatus 30. - The
flash memory 112 b stores aPMLKD 2 or a program for a setting change to be made by the portable medium 220 (hereinafter referred to as “applying program”). The elements 301-306 depicted inFIG. 5 are executed via theCPU 112 a loading the applying program stored in theflash memory 112 b into theRAM 112 c. On the assumption that the applying program is executed by being read from theflash memory 112 b and loaded into theRAM 112 c, theUI unit 301 is achieved by theCPU 112 a, theflash memory 112 b, theRAM 112 c, theinterface 112 d, and theinput unit 116. Thedecoding unit 303, the applyingunit 304, thePMLKD decoding unit 305, and thePMLKD applying unit 306 are achieved by theCPU 112 a, theflash memory 112 b, and theRAM 112 c. Themedium recognizing unit 302 is achieved by theCPU 112 a, theflash memory 112 b, theRAM 112 c, theinterface 112 d, and themedium driving apparatus 117. -
FIG. 9 is a flowchart of an updating process. The updating process is achieved by executing the aforementioned applying program, and setting changes made by theportable medium 220 and aPMLKD 2 are achieved by performing the updating process. For convenience,FIG. 9 does not indicate the portion related to a setting change made by displaying thechange history screen 710. With reference toFIG. 9 , the following will describe the updating process in detail. Assume that the configuration illustrated inFIG. 11 is the configuration of theCL apparatus 30 that performs the updating process. More particularly, assume that the applying program is executed by theCPU 112 a of theSVP 112. - First, the
CPU 112 a causes thedisplay apparatus 107 of theinput unit 116 to display the selection screen 610 (SC11). Next, theCPU 112 a monitors, via theinterface 112 d, an operation performed by the operator on theoperation unit 116 b of theinput unit 116 and determines whether the type of data selected by the operator is model lock data, i.e., encrypted data input using the portable medium 220 (SC12). When the operator inputs “1” on theselection screen 610 and orders execution, a judgment of YES is indicated in SC12, shifting the flow to SC13. When the operator inputs “2” on theselection screen 610 and orders execution, a judgment of NO is indicated in SC12, shifting the flow to SC19. - In SC13-SC18, a process is performed for achieving a setting change using the
portable medium 220. - First, in SC13, via the
interface 112 d, theCPU 112 a instructs themedium driving apparatus 117 to read encrypted data stored in theportable medium 220 that has been set up. Next, using a serial ID as thedecode key 312, theCPU 112 a decodes the encrypted data read from the portable medium 220 (SC14). Then, theCPU 112 a causes thedisplay unit 116 a of theinput unit 116 to display model lock data obtained via the decoding, i.e., the setting value of each model lock word (SC15). - The operator checks details of the model lock data displayed on the
display unit 116 a and, if appropriate, orders updating. TheCPU 112 a performs monitoring via theinterface 112 d so as to determine whether the operator operates theoperation unit 116 b of theinput unit 116 to order updating (SC16). When the operator performs an operation to order updating, a judgment of YES is indicated in SC16, shifting the flow to SC17. When the operator orders cancellation of updating, a judgment of NO is indicated in SC16, shifting the flow to SC18. - In SC17, the
CPU 112 a overwrites model lock data within settingdata 314 stored in theflash memory 112 b with the decoded model lock data. TheCPU 112 a stores the decoded model lock data, together with the current time and date, in thehistory DB 313 configured in theflash memory 112 b. The decoded model lock data is applied in this way, and the flow then shifts to SC18. - In SC18, the
CPU 112 a causes thedisplay unit 116 a of theinput unit 116 to display the result of the applying. When model lock data is applied, i.e., when the flow shifts from SC17 to SC18, theCPU 112 a causes thedisplay unit 116 a to display a screen to report to the operator that the applying has been appropriately finished. When model lock data is not applied, i.e., when the flow shifts from SC16 to SC18, theCPU 112 a causes thedisplay unit 116 a to display a screen to report to the operator that a setting change was not made. Then, the updating process ends. - In SC19-SC24, i.e., steps to which the flow shifts when a judgment of NO is indicated in SC12, a process is performed for achieving a setting change by manually inputting a
PMLKD 2. - First, in SC19, the
CPU 112 a causes thedisplay unit 116 a of theinput unit 116 to display thePMLKD entry screen 620, and inputs aPMLKD 2 in accordance with the operator's operation on theoperation unit 116 b. When the operator indicates the end of the inputting by operating theoperation unit 116 b, theCPU 112 a decodes theinput PMLKD 2 using a serial ID as the decode key 312 (SC20). For each model lock word represented by decoded model-lock-word class data, theCPU 112 a causes thedisplay unit 116 a of theinput unit 116 to display a decoded setting value (SC21). - The operator checks a setting value displayed for each model lock word on the
display unit 116 a and, if appropriate, orders updating. TheCPU 112 a performs monitoring via theinterface 112 d so as to determine whether the operator operates theoperation unit 116 b of theinput unit 116 to order updating (SC22). When the operator performs an operation to order updating, a judgment of YES is indicated in SC22, shifting the flow to SC23. When the operator does not perform an operation to order updating, a judgment of NO is indicated in SC22, shifting the flow to SC24. - In SC23, the
CPU 112 a overwrites any of the setting values of the model lock words within settingdata 314 stored in theflash memory 112 b with the decoded setting value of a model lock word obtained by decoding the model-lock-word class data. TheCPU 112 a stores the setting value of the model lock word obtained by decoding the model-lock-word class data in thehistory DB 313 configured in theflash memory 112 b, together with the current time and date. The setting change based on aPMLKD 2 is made in this way, and the flow then shifts to SC18. - In SC24, the
CPU 112 a performs monitoring via theinterface 112 d so as to determine whether the operator operates theoperation unit 116 b of theinput unit 116 to order re-inputting (SC24). When the operator performs an operation to order re-inputting, a judgment of YES is indicated in SC24, shifting the flow to SC19, where thedisplay unit 116 a displays thePMLKD entry screen 620 again. When the operator orders neither updating nor re-inputting, i.e., when the operator orders cancellation of updating, a judgment of NO is indicated in SC24, shifting the flow to SC18. - When the flow shifts from SC23 to SC18, the
CPU 112 a causes thedisplay unit 116 a to display a screen to report to the operator that the applying has been appropriately finished. When the flow shifts from SC24 to SC18, theCPU 112 a causes thedisplay unit 116 a to display a screen to report to the operator that a setting change was not made. Then, the updating process ends. - As described above, in the embodiment, an instruction to re-input the
PMLKD 2 can be given to an operator who checks the result of decoding. This is because, in the case of a manually inputPMLKD 2, inputting may possibly be mistakenly performed. Although not particularly illustrated, the PMLKD entry screen presented when the flow returns to SC19 displays, for eachinput PMLKD 2, the class and the setting value of a model lock word, thereby allowing the operator to more easily identify aPMLKD 2 that has been mistakenly input. - In the embodiment, one
PMLKD 2 is created for each model lock word, but onePMLKD 2 may be created for each set of a plurality of model lock words. An operator may select the classes of model lock words to be gathered and the number (combination) of the model lock words. APMLKD 2 may be input not only in a manual manner but also using a scanner or the like. This is because aPMLKD 2 is transmittable using a facsimile or the like. With regard to theCL apparatus 30, in accordance with a data input function of theCL apparatus 30 or the form of data representation that theCL apparatus 30 can address, the operator may arbitrarily select the form of outputting aPMLKD 2. - All examples and conditional language provided herein are intended for the pedagogical purposes of aiding the reader in understanding the invention and the concepts contributed by the inventor to further the art, and are not to be construed as limitations to such specifically recited examples and conditions, nor does the organization of such examples in the specification relate to a showing of the superiority and inferiority of the invention. Although one or more embodiments of the present invention have been described in detail, it should be understood that the various changes, substitutions, and alterations could be made hereto without departing from the spirit and scope of the invention.
Claims (9)
1. A setting-data encrypting apparatus comprising:
an input device from which setting data which indicates a detail to be newly set to an information processing apparatus whose performance-related setting is to be changed is input;
a processor configured to encrypt the setting data input via the input device; and
an output device configured to output encrypted data in a character string format.
2. The setting-data encrypting apparatus according to claim 1 , wherein
unique information assigned to the information processing apparatus is input from the input device, and
the processor encrypts the setting data using the input unique information as a common key that is also used in decoding.
3. The setting-data encrypting apparatus according to claim 1 , wherein
when the setting is changeable for each item,
an item to be newly set to the information processing apparatus is input from the input device, and
for each item, the processor encrypts the setting data and class data indicating the item.
4. An information processing apparatus comprising:
an input device from which encrypted data including an encrypted setting data which indicates a detail to be newly set to the information processing apparatus, the detail being used to change performance-related setting is input;
a processor configured to decode the encrypted data input via the input device and
to change the performance-related setting using the setting data decoded by the processor.
5. The information processing apparatus according to claim 4 , comprising:
a memory configured to store unique information assigned to the information processing apparatus, wherein
the processor decodes the input encrypted data using the unique information.
6. The information processing apparatus according to claim 4 , wherein
the encrypted data is obtained by encrypting the setting data and class data indicating an item for which setting is to be changed using the setting data,
the processor decodes the setting data and the class data for each piece of encrypted data, and changes the setting of the information processing apparatus using the setting data decoded together with the class data.
7. A setting changing method comprising:
obtaining, by an information processing apparatus, encrypted data including an encrypted setting data which indicates a detail to be newly set to the information processing apparatus, the detail being used to change performance-related setting in a character string format,
decoding, by the information processing apparatus, the encrypted data, and
changing, by the information processing apparatus, the setting using the setting data obtained via the decoding.
8. A non-transitory computer-readable recording medium having stored therein a setting-data encrypting program for causing an information processing apparatus to perform a process comprising:
obtaining setting data which indicates a detail to be newly set to another information processing apparatus, the detail being used to change performance-related setting; encrypting the input setting data; and
outputting encrypted data in a character string format.
9. A non-transitory computer-readable recording medium having stored therein a setting changing program for causing an information processing apparatus to perform a process comprising:
obtaining encrypted data including an encrypted setting data which indicates a detail to be newly set to the information processing apparatus, the detail being used to change performance-related setting in a character string format;
decoding the input encrypted data; and
changing the setting using the setting data obtained via the decoding.
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
JP2013118892A JP2014236474A (en) | 2013-06-05 | 2013-06-05 | Setting data encryption device, information processing apparatus, setting change method, setting data encryption program and setting change program |
JP2013-118892 | 2013-06-05 |
Publications (1)
Publication Number | Publication Date |
---|---|
US20140365784A1 true US20140365784A1 (en) | 2014-12-11 |
Family
ID=50884689
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US14/292,959 Abandoned US20140365784A1 (en) | 2013-06-05 | 2014-06-02 | Setting-data encrypting apparatus, information processing apparatus, and setting changing method |
Country Status (3)
Country | Link |
---|---|
US (1) | US20140365784A1 (en) |
EP (1) | EP2814219A1 (en) |
JP (1) | JP2014236474A (en) |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN107950002A (en) * | 2015-09-15 | 2018-04-20 | 霍尼韦尔国际公司 | System and method for the protection Password Management of industrial equipment |
US20220094671A1 (en) * | 2016-01-08 | 2022-03-24 | Capital One Services, Llc | Methods and systems for securing data in the public cloud |
Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20050055575A1 (en) * | 2003-09-05 | 2005-03-10 | Sun Microsystems, Inc. | Method and apparatus for performing configuration over a network |
US7774774B1 (en) * | 2003-10-22 | 2010-08-10 | Apple Inc. | Software setup system |
Family Cites Families (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
IL107044A0 (en) * | 1992-09-21 | 1993-12-28 | Uniloc Singapore Private Ltd | System for software registration |
JP2003303028A (en) | 2002-04-09 | 2003-10-24 | Matsushita Electric Ind Co Ltd | Version-up system of navigation system |
CA2490881A1 (en) * | 2002-06-27 | 2004-01-08 | Snap-On Incorporated | Updating diagnostic device software and enabling features |
US20050049976A1 (en) * | 2003-08-26 | 2005-03-03 | Yang Harold (Haoran) | Remotely licensing configurable network diagnostic modules |
JP2007011944A (en) | 2005-07-04 | 2007-01-18 | Canon Inc | Image processor and firmware upgrading method |
-
2013
- 2013-06-05 JP JP2013118892A patent/JP2014236474A/en active Pending
-
2014
- 2014-05-28 EP EP20140170252 patent/EP2814219A1/en not_active Withdrawn
- 2014-06-02 US US14/292,959 patent/US20140365784A1/en not_active Abandoned
Patent Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20050055575A1 (en) * | 2003-09-05 | 2005-03-10 | Sun Microsystems, Inc. | Method and apparatus for performing configuration over a network |
US7774774B1 (en) * | 2003-10-22 | 2010-08-10 | Apple Inc. | Software setup system |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN107950002A (en) * | 2015-09-15 | 2018-04-20 | 霍尼韦尔国际公司 | System and method for the protection Password Management of industrial equipment |
US20220094671A1 (en) * | 2016-01-08 | 2022-03-24 | Capital One Services, Llc | Methods and systems for securing data in the public cloud |
US11843584B2 (en) * | 2016-01-08 | 2023-12-12 | Capital One Services, Llc | Methods and systems for securing data in the public cloud |
Also Published As
Publication number | Publication date |
---|---|
EP2814219A1 (en) | 2014-12-17 |
JP2014236474A (en) | 2014-12-15 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US11651084B2 (en) | Methods and systems for determining software risk scores | |
US9800412B2 (en) | System and method for securing sensitive data | |
TWI599976B (en) | Application store interface for remote management of client devices | |
US20160014042A1 (en) | System and method for cloud enterprise services | |
US11019168B2 (en) | System and method for integrating cloud applications into a cloud service broker platform using an automated, universal connector package | |
US10764163B2 (en) | Determining an event history for an event processed by a plurality of communicating servers via a central event data log | |
US11030598B2 (en) | System and method for remote management of sale transaction data | |
US11113097B2 (en) | System and method for provisioning integration infrastructure at runtime indifferent to hybrid nature of endpoint applications | |
US9451034B2 (en) | Managing interaction with hosted services | |
US8328104B2 (en) | Storage device management systems and methods | |
US9397987B1 (en) | Managing interaction with hosted services | |
WO2022255396A1 (en) | Electronic apparatus, system, and method for deleting data stored in storage device of electronic apparatus | |
US20140316828A1 (en) | System and method for exchanging an electronic ticket | |
US20140365784A1 (en) | Setting-data encrypting apparatus, information processing apparatus, and setting changing method | |
CN109784103A (en) | The acquisition methods and device and storage medium of a kind of USB device usage record | |
US11729161B1 (en) | Pre-built, pre-tested, and standardized connectors for end-to-end connection | |
CN115809879A (en) | Block chain data processing method, device, equipment and storage medium | |
Mikhaylov | Mobile Forensics Cookbook: Data acquisition, extraction, recovery techniques, and investigations using modern forensic tools | |
CN114371866A (en) | Version reconfiguration test method, device and equipment of service system | |
CN116643794B (en) | Information processing method and device and electronic equipment | |
KR102629930B1 (en) | Method for linking a work between platforms and platform using the same | |
WO2024180842A1 (en) | Electronic device | |
US11410224B1 (en) | Methods and software for requesting a pricing in an electronic marketplace using a user-modifiable spectrum interface | |
KR102256456B1 (en) | Method for operating website of company public relations and product sales and apparatus thereof | |
JP2023157292A (en) | Electronic device, system, and method of erasing data stored in storage device of electronic device |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
AS | Assignment |
Owner name: FUJITSU LIMITED, JAPAN Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:ENDO, GO;SAWADA, YUSUKE;SIGNING DATES FROM 20140513 TO 20140523;REEL/FRAME:033359/0856 |
|
STCB | Information on status: application discontinuation |
Free format text: ABANDONED -- FAILURE TO RESPOND TO AN OFFICE ACTION |